quantization watermarking design and analysis of digital watermarking, information embedding, and...

Post on 14-Dec-2015

223 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Quantization Watermarking

Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems

Brian Chen, Ph. D. Dissertation, M. I. T.

Multimedia Security

2

Outline

• Introduction

• Mathematical modeling of digital watermarking

• Quantization index modulation

• Dither modulation

3

Information Embedding Systems

• Information embedding systems embed one signal, the so-called “embedded signal” or “watermark”, within another signal, a “host signal”.– The embedding must be robust to common

degradations or intentional attacks.– As long as the host survives, the watermark

should survive.

4

Information Embedding Applications

• Owner identification

• Copyright enforcement

• Broadcast monitoring

• Transaction monitoring

• Copy control

• Device control

• Data authentication

5

General Information Embedding Model

• An integer is embedded in the host signal vector using some embedding function s(x,m).

• n is a perturbation vector corrupts the composite signal .

• The decoder extracts an estimate of m from the noisy channel output y. (x is not always available)

NRxNRs

x

6

Distortions Caused by Information Embedding and Channel Noises

• The degradation to the host signal must be acceptable and is usually measured by some distortion function between the host and the composite signal

• s is subject to a variety of signal corrupting manipulations such as lossy compression, addition of random noise,….The degradations caused by the channel should not be too large, either.

2||||1

),( xsN

xsD

)()(1

),( xsWxsN

xsD T

Squared error distortion measure

7

Conflicting Goals

• Three conflicting goals of information embedding systems we want to achieve– Low distortion– High robustness– High rate

• The performance of a watermarking system is evaluated in terms of its achievable rate-distortion-robustness trade-offs.

8

Equivalent Super-Channel Model

• s(x,m)=e(x,m)+x• The host signal x is viewed as a known state of this super-

channel • Information embedding problems are viewed as power-limited

communication over a super-channel.

22 ||||1

||||1

eN

xsN

9

Considering Channel Models

• Different viewpoints– Description of the degradations that can occurred to

the composite signal– Description of the degradations against which we

wish the embedder and decoder to be against• Described probabilistically or deterministically • Examples

– Bounded perturbation channels• Bounds the energy of the perturbation vector

– Additive noise channels• The perturbation vector n is random and statistically

independent of s

222 |||||||| nNnsy

10

Classifying Embedding Methods

• Classifying by different types of signals– Not suitable for high-level discussions

• Classifying by different effects of host-signals due to system design– Host-interference non-rejecting methods– Host-interference rejecting methods

Only blind-host systems are of concern during this discussion

11

Host-interference Non-rejecting Methods

• The host signal is a source of interference in the system.• The encoder do not sufficiently exploit knowledge of the host

signal x• Most currently important watermarking techniques are of this

type

vxsxs

xsma

maxvss T

)~~(

~~)(

)(~~

vmaxs

vmamw

mwxmxs

)(

)()(

)(),(

12

Geometrical Interpretation

• x and n can be of any direction and constrained amplitude

v

x

a(m)vn

s~x~

13

Specific Weighted Embedding Functions

• Additive in the log domain• Thus, still host-interference non-rejecting in the log

domain• Host signal will still limit the performance

xx )(

)1log(loglog

)1(

vxs

vxxvxs

14

Host-interference Rejecting Example (I)

• M. D. Swanson, B. Zhu, and A. H. Tewfik, “Data Hiding for Video-in-

Video,” Proc. of ICIP, 1997

15

Host-interference Rejecting Example (II)

• The DCT coefficient is projected to a pseudo-random vector • Another projection vector can be of use to embed more than 1 bit.

vxx T~

16

Host-interference Rejecting Example (III)

• The quantization step T is decided by determining the frequency masking

• The host signal determines the particular x or o that is chosen, but it does not inhibit the decoder’s ability to determine whether it is a o or x.

)()~(~ mdxqs

vxsxs )~~(

17

Generalized Least Bit Modulation (LBM)

• The quantization-and-perturbation process is equivalent to

– Quantize x with a quantizer of step size whose reconstruction points are the union of o and x.

– Modulate the least significant bit in the bit label with the

watermark bit to arrive at a composite signal bit label.

2/

18

Characteristics of LBM

• The set of embedding intervals corresponding to a given value are the same to the set of embedding intervals to all other intervals

• This is an unnecessary constraint for data embedding system. (Later, QIM will take advantage of this)

}),(|{)( 00 smxsxsIm

}2,...,1{,,}|)({}|)({ mNRjjjjiiii jiSssISssI

19

Designing the Embedding Function (I)

• The embedding function can be viewed as an ensemble of functions of x, indexed by m.

• Since the embedding-introduced distortion should be small, each function in the ensemble must be close to an identity function.

• The system needs to be robust to perturbations. Thus the points in the range of one function in the ensemble should be far away in some sense from the points in the range of any other function. – E.g. non-intersecting

mxmxs ,);(

);(),( mxsmxs

Functions resembles with intersecting range

20

Designing the Embedding Function (II)

• Approximate-identity property– the range of the functions should cover the

space of possible x

• Non-intersecting property – discontinuous functions

• Quantization is such a discontinuous and approximate-identity function.

21

Quantization Index Modulation

• One bit is to be embedded, i.e.• Two quantizers are

required.The reconstruction points of each are represented with x and o.– If m =1, x is quantized with

the x-quantizer, i.e. s is chosen to be the x closest to x.

– If m=2, x is quantized with the o-quantizer.

22

Convenience from an Engineering Perspective

• Information-embedding rate

– The number of quantizers• Embedding-introduced distortion

– The size and shapes of the quantization cells

• Robustness of the embedding

– The minimum distance between the sets of reconstruction points of different quantizers.

• The minimum distance decoder

||);();(||min

||);();(||minmin

:),(min

),(:),(min

jxsixsd

jxsixsd

jiji

jixxjiji ji

||);(||minminarg)(ˆ mxsyymxm

23

Robustness against Different Channels

• The bounded perturbation channel

• The additive white Gaussian noise channel

14

)2

(||||2

2min2min22

nn N

ddnN

dtexQ

dQmm

d

x

t

nn

2

2

2min2min2

2

2

1)(

)4

(~]ˆPr[)2

(

24

QIM v.s. Generalized LBM (I)

• The embedding intervals for a pair of reconstruction points in generalized LBM are the same=>The union of the two quantization cells.

• In QIM, the quantization cells of the quantizers need not to be the same.

25

QIM v.s. Generalized LBM (II)

• The embedding caused distance are smaller in QIM than in generalized LBM

though the minimum distance in the two cases are the same

26

Dithering in Coarse Quantizers

• Techniques used to enhance quantization of coarse quantizers

27

Dithering in Coarse Quantizers

• Techniques used to enhance quantization of coarse quantizers

28

Dithering in Coarse Quantizers

• Techniques used to enhance quantization of coarse quantizers

29

Dither Modulation

• Quantization cells and reconstruction points of any quantizer in the ensemble are shifted versions of the quantization cells and reconstruction points of any other quantizer.

• Each embedded message is uniquely mapped to a different dither vector d(m)

)())(();( mdmdxqmxs

30

Dither Modulation System (I)

• The NRm bits {b1, b2,…,bNRm} representing the embedded message m are error correction coded using a rate ku/kc code to obtain a coded bit sequence {z1, z2,…,zN/L}, where L=(ku/kc)/Rm

• We divided the host signal x into N/L non-overlapping blocks of length L and embed the i-th coded bit zi in the i-th block.

31

Dither Modulation System (II)

• Two length L dither sequence d[k,0] and d[k,1] and one length L sequence of uniform, scalar quantizers with step sizes are constructed by

Lk

kdkd

kdkdkd

k

k

,...,1,0]0,[,

2]0,[

0]0,[,2

]0,[]1,[

k ,...,1

32

Dither Modulation System (III)

• The i-th block of x is quantized with the dithered quantizer using the dither sequence d[k, zi]

• The corresponding minimum distance decoder

LNilkskyziL

Liky

li /,...,1,]);[][(minargˆ

1)1(

2

}1,0{

33

Dither Modulation System (IV)

34

Dither Modulation System (IV)

35

Minimum Distance

• The square of the minimum distance over all N dimensions

kk

mc

kk

mc

uH

l

k

kH

LR

LRk

kd

dd

2

2

1

22min

4

1

4

1

2

Gain of the error correction code

Hamming distance of the error correction code

36

Distortion-normalized Squared Minimum Distance

• The overall average expected distortion

• The distortion-normalized squared minimum distance

m

c

snorm RD

dd

32min2

k

ks LD 2

12

1

37

Spread-Transform Dither Modulation (I)

• The reconstruction points of two quantizers for embedding one bit in a block of two samples where the quantization step sizes are the same for both samples

2/min d

38

Spread-Transform Dither Modulation (II)

• Apply a unitary transform first so that the first transform coefficient is the component of the host signal in the direction of v. The second transform coefficient is the component orthogonal to v.

39

Spread-Transform Dither Modulation (III)

• Since in both cases, the minimum distance and the average square error distortion are the same, the robustness against bounded perturbations is the same in both cases.

• However, since the decision region of the later case contains the decision region of the first one, for additive noise channels, the probability of a correct decision is higher in the later case.

40

Spread-Transform Dither Modulation (IV)

)~())(~(),( vxxvmaxmxs

41

STDM v.s. AMSS

)~~(

4

~~)(~4|)2()1(|

)(

)(~~

2

nxP

LDSNR

nxmay

LDaa

LDma

maxs

sAMSS

s

s

)~(

3

~~

34

|)2,~()1,~(|min

12

)())(~(~

22

21)~,~( 21

np

LDSNR

nsy

LDxsxs

LD

mdmdxqs

SSTDM

sxx

s

AMSSSTDM

)~(

)~~(

4

3

nP

nxP

SNR

SNR

AMSS

STDM

42

STDM v.s. LBM

m

c

kk

mc

kk

Rd

LRd

LL

mdEN

xxqEN

mdxxqEN

xsEN

mdxqs

norm

7

12

4

1

)16

1

12

1(

)(1

)(1

)()(11

)()(

2

22min

2

22

22

top related